-
1
-
-
0034316289
-
“Digital rights management and watermarking of multimedia content for m-commerce applications
-
F Hartung and F. Ramme, “Digital rights management and watermarking of multimedia content for m-commerce applications,” IEEE Communications Magazine, vol. 38, pp. 78–84, Nov 2000.
-
(2000)
IEEE Communications Magazine,
, vol.38
, pp. 78-84
-
-
Hartung, F.1
Ramme, F.2
-
2
-
-
0004678583
-
-
International Telecommunication Union, Place des Nations 1211 Geneva 20 Switzerland, July
-
International Telecommunication Union, Place des Nations 1211 Geneva 20 Switzerland, ITU-T Recommendation X.509, Information Technology, Open Systems Interconnection, The Directory: Authentication Framework, July 1997. http://www.itu.int.
-
(1997)
ITU-T Recommendation X.509, Information Technology, Open Systems Interconnection, the Directory: Authentication Framework
-
-
-
3
-
-
0012164995
-
Whos got the key?,”
-
ACM Press
-
D. Henry, “Who’s got the key?,” in Proceedings of the 27th annual SIGUCCS Conference on Mile high expectations, (Denver, Colorado, United States), pp. 106–110, ACM Press, 1999.
-
(1999)
Proceedings of the 27Th Annual SIGUCCS Conference on Mile High Expectations, (Denver, Colorado, United States)
, pp. 106-110
-
-
Henry, D.1
-
5
-
-
84949042974
-
-
Email: {b.s.gelbord, d.h.hut, g.kleinhuis
-
B. Gelbord, H. Hut, G. Keinhuis, and E Kwast, “Access control based on attribute certificates.” Email: {b.s.gelbord, d.h.hut, g.kleinhuis, e.kwast}kpn.com, 2002.
-
(2002)
Access Control Based on Attribute Certificates.
-
-
Gelbord, B.1
Hut, H.2
Keinhuis, G.3
Kwast, E.4
-
6
-
-
0012077289
-
Attribute certification: An enabling technology for delegation and rolebased controls in distributed environments
-
ACM Press
-
J. Linn, “Attribute certification: An enabling technology for delegation and rolebased controls in distributed environments,” in Proceedings of the 4th ACM Workshop on role-based access control on Role-based access control, (Fairfax, Virgina, United States), pp. 121–130, ACM Press, 1999.
-
(1999)
Proceedings of the 4Th ACM Workshop on Role-Based Access Control on Role-Based Access Control, (Fairfax, Virgina, United States)
, pp. 121-130
-
-
Linn, J.1
-
7
-
-
84949042975
-
Digital rights management (Drm) using xrml
-
H. Guo, “Digital rights management (drm) using xrml,” in Telecommunications Software and Multimedai TML-C7, 2001. http://www.tml.hut.fi/Studies/T-110.501/2001/papers/.
-
(2001)
Telecommunications Software and Multimedai TML-C7
-
-
Guo, H.1
-
8
-
-
0242708865
-
Escrow services and incentives in peer-to-peer networks
-
B. Horne, B. Pinkas, and T. Sander, “Escrow services and incentives in peer-to-peer networks,” in Proceedings of the 3rd ACM Conference on Electronic Commerce, pp. 85–94, October 2001.
-
(2001)
Proceedings of the 3Rd ACM Conference on Electronic Commerce, Pp. 85–94
-
-
Horne, B.1
Pinkas, B.2
Sander, T.3
-
9
-
-
7544225008
-
A license management model to support b2c and c2c music sharing
-
Hong Kong, May
-
S. H. Kwok and S M. Lui, “A license management model to support b2c and c2c music sharing,” in 10th International World Wide Web Conference, Hong Kong, pp. 136–137, May 2001.
-
(2001)
10Th International World Wide Web Conference
, pp. 136-137
-
-
Kwok, S.H.1
Lui, S.M.2
-
11
-
-
6344277479
-
Combining digital watermarks and collusion secure fingerprints for digital images
-
J. Dittman, A. Behr, M. Stabenau, P. Schmitt, J. Schwenk, and J. Ueberberg, “Combining digital watermarks and collusion secure fingerprints for digital images,” in IEE Electronics and Communications, London, pp. 6/1–6/6, 2000. UK ISSN 0963-3308 - Reference No:2000/39.
-
(2000)
IEE Electronics and Communications
, pp. 1-6
-
-
Dittman, J.1
Behr, A.2
Stabenau, M.3
Schmitt, P.4
Schwenk, J.5
Ueberberg, J.6
-
13
-
-
84976810280
-
Copy detection mechanisms for digital documents
-
May
-
S. Brin, J. Davis, and H. Garcia-Molina, “Copy detection mechanisms for digital documents,” in Proceedings of the ACM SIGMOD Annual Conference San Jos´e, pp. 398–409, May 1995.
-
(1995)
Proceedings of the ACM SIGMOD Annual Conference San Jos´e
, pp. 398-409
-
-
Brin, S.1
Davis, J.2
Garcia-Molina, H.3
-
15
-
-
0034446784
-
Distribution chain security
-
ACM Press, New York
-
G. Durfee and M. Franklin, “Distribution chain security,” in Proceedings of the 7th ACM Conference on Computer and Communications Security, pp. 63–70, ACM Press, New York, 2000.
-
(2000)
Proceedings of the 7Th ACM Conference on Computer and Communications Security
, pp. 63-70
-
-
Durfee, G.1
Franklin, M.2
-
16
-
-
0035417219
-
-
IEEE Press, M. Barni, F. Bartolini, I.J. Cox, J. Hernandez, F. P´erez-Gonz´alez, Guest Eds. Invited paper
-
S. Voloshynovskiy, S. Pereira, T. Pun, J. Eggers, and J. Su, “Attacks on digital watermarks: Classification, estimation-based attacks and benchmarks,” in IEEE Communications Magazine (Special Issue on Digital Watermarking for Copyright Protection: a communications perspective), vol. 39, pp. 118–127, IEEE Press, 2001. M. Barni, F. Bartolini, I.J. Cox, J. Hernandez, F. P´erez-Gonz´alez, Guest Eds. Invited paper.
-
(2001)
Attacks on Digital Watermarks: Classification, Estimation-Based Attacks and Benchmarks, in IEEE Communications Magazine (Special Issue on Digital Watermarking for Copyright Protection: A Communications Perspective)
, vol.39
, pp. 118-127
-
-
Voloshynovskiy, S.1
Pereira, S.2
Pun, T.3
Eggers, J.4
Su, J.5
-
17
-
-
84948957142
-
Webguard: A system for web content protection
-
Hong Kong, May
-
M. Mourad, J. Munson, T. Nadeem, G. Pacifici, and M Pistoria, “Webguard: A system for web content protection,” in 10th International World Wide Web Conference, Hong Kong, pp. 142–143, May 2001.
-
(2001)
10Th International World Wide Web Conference
, pp. 142-143
-
-
Mourad, M.1
Munson, J.2
Nadeem, T.3
Pacifici, G.4
Pistoria, M.5
-
18
-
-
4344678198
-
Dynamic self-checking techniques for improved tamper resistance
-
February
-
B. Horne, L. Matheson, C. Sheehan, and R. E. Tarjan, “Dynamic self-checking techniques for improved tamper resistance,” in Workshop on Security and Privacy in Digital Rights Management 2001, February 2002.
-
(2002)
Workshop on Security and Privacy in Digital Rights Management 2001
-
-
Horne, B.1
Matheson, L.2
Sheehan, C.3
Tarjan, R.E.4
-
19
-
-
0034445599
-
Architectural support for copy and tamper resistant
-
D. Lie, C. Thekkath, M. Mitchell, and P. Lincoln, “Architectural support for copy and tamper resistant,” in Architectural Support for Programming Languages and Operating Systems, pp. 168–177, 2000.
-
(2000)
Architectural Support for Programming Languages and Operating Systems
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
-
20
-
-
0033723110
-
Design and implementation of an access control processor for xml documents
-
E. Damiani, S. de Capitai di Vimercati, S. Paraboschi, and P. Samarati, “Design and implementation of an access control processor for xml documents,” in Proceedings of WWW9Computer Networks, 1–6, pp. 59–75, 2000.
-
(2000)
Proceedings of Www9computer Networks, 1–6
, pp. 59-75
-
-
Damiani, E.1
De Capitai Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
21
-
-
84937420536
-
Securing xml documents
-
of LNCS, Springer
-
E. Damiani, S. de Capitai di Vimercati, S. Paraboschi, and P. Samarati, “Securing xml documents,” in Advances in Database Technology - EDBT 2000, 7th International Conference on Extending Database nology, Konstanz, Germany, March 27-31, 2000, Proceedings, vol. 1777 of LNCS, pp. 121–135, Springer, 2000.
-
(2000)
Advances in Database Technology - EDBT 2000, 7Th International Conference on Extending Database Nology, Konstanz, Germany, March 27-31, 2000, Proceedings
, vol.1777
, pp. 121-135
-
-
Damiani, E.1
De Capitai Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
22
-
-
84989880098
-
Controlled access and dissemination of xml documents
-
E. Bertino, S. Castano, E. Ferrari, and M. Mesili, “Controlled access and dissemination of xml documents,” in Proceedings 2nd ACM Workshop on Web Information and Data Management (WIDM´99), pp. 22–27, 1999.
-
(1999)
Proceedings 2Nd ACM Workshop on Web Information and Data Management (WIDM´99)
, pp. 22-27
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
Mesili, M.4
-
24
-
-
85084161255
-
Cryptographic support for secure logs on untrusted machines
-
USENIX Press, January
-
B. Schneier and J. Kelsey, “Cryptographic support for secure logs on untrusted machines,” in The 7th USENIX Security Symposium Proceedings, pp. 53–62, USENIX Press, January 1998.
-
(1998)
The 7Th USENIX Security Symposium Proceedings
, pp. 53-62
-
-
Schneier, B.1
Kelsey, J.2
-
25
-
-
50349097669
-
Secure audit logging with tamperresistant hardware
-
C. N. Chong, Z. Peng, and P. H. Hartel, “Secure audit logging with tamperresistant hardware,” tech. rep., Universiteit Twente, Enschede, The Netherlands, August 2002. ISSN: 1381-3625.
-
(2002)
Tech. Rep., Universiteit Twente, Enschede
-
-
Chong, C.N.1
Peng, Z.2
Hartel, P.H.3
-
26
-
-
84953635000
-
Description of a new variable-length key, 64-bit block cipher (Blowfish)
-
Springer-Verlag, December
-
B. Schneier, “Description of a new variable-length key, 64-bit block cipher (blowfish),” in Fast Software Encryption, Cambridge Security Workshop Proceedings, pp. 191–204, Springer-Verlag, December 1994.
-
(1994)
Fast Software Encryption, Cambridge Security Workshop Proceedings
, pp. 191-204
-
-
Schneier, B.1
-
27
-
-
0003855464
-
-
John Wiley & Sons, Inc.
-
B. Schneier, Applied Cryptography, Second Edition, ch. 15, pp. 357–368. John Wiley & Sons, Inc., 1996. ISBN: 0-471-11709-9.
-
(1996)
Applied Cryptography, Second Edition, Ch. 15, Pp. 357–368
-
-
Schneier, B.1
-
28
-
-
84905857886
-
A fast mpeg video encryption algorithm
-
ACM Press
-
C. Shi and B. Bhargava, “A fast mpeg video encryption algorithm,” in Proceedings of the 6th ACM International Conference on Multimedia, (Bristol, United Kingdom), pp. 81–88, ACM Press, 1998.
-
(1998)
Proceedings of the 6Th ACM International Conference on Multimedia, (Bristol, United Kingdom)
, pp. 81-88
-
-
Shi, C.1
Bhargava, B.2
-
29
-
-
83455251951
-
Streaming media
-
January
-
F LaMonica, “Streaming media,” Linux Journal, vol. 81, January 2001.
-
(2001)
Linux Journal
, vol.81
-
-
Lamonica, F.1
-
30
-
-
26444574191
-
Breaking and fixing the Needham-Schroeder Public-Key protocol using FDR
-
G. Lowe, “Breaking and fixing the Needham-Schroeder Public-Key protocol using FDR,” Software Concepts and Tools, vol. 17, pp. 93–102, 1996.
-
(1996)
Software Concepts and Tools
, vol.17
, pp. 93-102
-
-
Lowe, G.1
-
31
-
-
0043024894
-
Questions and answers about ten formal methods
-
Vol II (S. Gnesi and D. Latella, eds.), (Trento, Italy), ERCIM/CNR, Pisa, Italy
-
P. H. Hartel, M. Butler, A. Currie, P. Henderson, M. Leuschel, A. Martin, A. Smith, U. Ultes-Nitsche, and B. Walters, “Questions and answers about ten formal methods,” in 4th Int. Workshop on Formal Methods for Industrial Critical Systems, Vol II (S. Gnesi and D. Latella, eds.), (Trento, Italy), pp. 179–203, ERCIM/CNR, Pisa, Italy, Jul 1999. www.dsse.ecs.soton.ac.uk/techreports/99-1.html.
-
(1999)
4Th Int. Workshop on Formal Methods for Industrial Critical Systems
, pp. 179-203
-
-
Hartel, P.H.1
Butler, M.2
Currie, A.3
Henderson, P.4
Leuschel, M.5
Martin, A.6
Smith, A.7
Ultes-Nitsche, U.8
Walters, B.9
-
32
-
-
18944390941
-
The model checker SPIN
-
G. J. Holzmann, “The model checker SPIN,” IEEE Transactions on software engineering, vol. 23, no. 5, pp. 279–295, 1997. http//cm.bell-labs.com/cm/cs/who/gerard/.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.5
, pp. 279-295
-
-
Holzmann, G.J.1
|